18507465. SECURE AUTHENTICATION OF A USER simplified abstract (Capital One Services, LLC)
Contents
- 1 SECURE AUTHENTICATION OF A USER
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SECURE AUTHENTICATION OF A USER - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
SECURE AUTHENTICATION OF A USER
Organization Name
Inventor(s)
Jeremy Goodsitt of Champaign IL (US)
Austin Walters of Savoy IL (US)
Fardin Abdi Taghi Abad of Champaign IL (US)
Anh Truong of Champaign IL (US)
Vincent Pham of Champaign IL (US)
Reza Farivar of Champaign IL (US)
SECURE AUTHENTICATION OF A USER - A simplified explanation of the abstract
This abstract first appeared for US patent application 18507465 titled 'SECURE AUTHENTICATION OF A USER
Simplified Explanation
The abstract describes a system where a device detects a communication between a user and a service representative, sends an authentication notification to the user's device, and generates authentication codes based on user input and personal information.
- The device detects communication involving a user and a service representative.
- An authentication notification is sent to the user's device.
- The user enters personal information into an authentication field on their device.
- The device generates authentication codes based on user input and personal information.
- An action is performed based on the generated authentication codes.
Potential Applications
This technology could be applied in various industries such as banking, customer service, and e-commerce to securely authenticate users during interactions with service representatives.
Problems Solved
This technology solves the problem of ensuring secure authentication of users during communications with service representatives, reducing the risk of unauthorized access to sensitive information.
Benefits
The benefits of this technology include enhanced security, improved user authentication processes, and protection of personal information during interactions with service representatives.
Potential Commercial Applications
A potential commercial application of this technology could be in the financial services industry, where secure authentication of users is crucial for protecting sensitive financial data.
Possible Prior Art
One possible prior art for this technology could be two-factor authentication systems that require users to provide both something they know (such as a password) and something they have (such as a mobile device) to access their accounts securely.
Unanswered Questions
How does the device ensure the security of the authentication codes generated?
The abstract does not provide details on the specific security measures implemented to protect the authentication codes from unauthorized access.
What types of personal information are used for generating the second authentication code?
The abstract does not specify the exact personal information used in the data structure to generate the second authentication code.
Original Abstract Submitted
A device detects a communication involving a user associated with an account and a service representative, and sends, to a user device associated with the account, an authentication notification that causes the user device to display an authentication field for the user. The device sends, to a service representative device associated with the service representative, a message that indicates that the service representative is to request, via the communication, the user to enter personal information associated with the user into the authentication field, where the user device is configured to generate a first authentication code based on a user input received from the user device in the authentication field. The device generates a second authentication code based on personal information associated with the account from a data structure, receives the first authentication code, and performs an action based on the first authentication code and the second authentication code.